In the message dated: Mon, 25 Nov 2013 16:57:31 -0800,
The pithy ruminations from Adam Compton on 
<Re: [lopsa-discuss] Opinions on integrating Linux machines with AD?> were:
=> The way we do this at $WORK is roughly the following:
=> 
=> * Each Linux host has an /etc/krb5.conf that tells it about the AD realm

Same here.

=> * We run a script that queries AD via LDAP for all of the user and group 
=> data and crafts /etc/passwd and /etc/group accordingly (retaining system 
=> service accounts, etc.)

In our environment, only selected users (about 150 out of ~5K+ in the
enterprise) have access to our Linux servers, so authorization is done
locally, in the form of entries in /etc/{passwd,shadow}.

Login names are identical to AD.

Authentication is handled entirely by AD.

=> * sshd is configured with "GSSAPIAuthentication yes"
=> * We instruct users to use "GSSAPIAuthentication yes" in their ssh 
=> .config files, and to run "kinit" at appropriate intervals or 
=> automatically on login, etc.

Hmmm...something to consider for desktop Linux machines. I wonder if that
would give us SSO for users who authenticate via AD on their desktop to login
(via SSH, with GSSAPIAuthentication) to our cluster.


[SNIP!]

=> configuration has some more features on top of this (UIDs are derived 
=> from the RID in AD, so they're consistent for that user across all 

We create UIDs and GIDs locally.

=> "loginShell" AD attribute is respected; disabled accounts are disabled, 

Same here, if the account is disabled in AD, the user cannot login.

=> The downside of this configuration is that logins will not function if 
=> AD is unavailable or if a user can't get a TGT for whatever reason; we 
=> maintain system accounts with known SSH authorized_keys so specially 
=> selected ops people can log in to troubleshoot things.

Same.

=> 
=> This is a pretty unique setup; I don't know of anybody else who has 
=> their AD integration organized in this way. Most people I've seen either 

[Raises hand]

I don't know if it's all that unique...

[SNIP!]
=> get comprehensive group membership and authorization for basically free, 
=> and users can be members of both AD-derived and system-native groups 
=> trivially (which is sometimes tricky with the other solutions). I don't 

Yes. We don't rely on any AD-derived groups (the enterprise doesn't store
group info with enough granularity for us), but we use local groups very
heavily.

Mark

=> have the ability to publish the script but I'd be happy to explain in 
=> greater detail if anybody likes.
=> 
=> - Adam
=> 

-- 
Mark Bergman
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to